Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai.
"The target of the threat actors were Thailand officials based on the nature of the lures," Nikhil Hegde, senior engineer for Netskope's Security Efficacy team, told The Hacker News. "The Yokai backdoor itself is not
A vulnerability classified as problematic was found in Geovision GV-ASManager. This vulnerability affects unknown code. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-12553. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Wacom Center. This issue affects some unknown processing. The manipulation leads to link following.
The identification of this vulnerability is CVE-2024-12552. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sun JavaMail 1.1.3/1.2/1.3.2. It has been classified as problematic. Affected is an unknown function of the component Apache Tomcat. The manipulation of the argument Download leads to information disclosure.
This vulnerability is traded as CVE-2005-1754. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The real existence of this vulnerability is still doubted at the moment.
A vulnerability classified as problematic has been found in Linux Kernel up to 6.1.75/6.6.14/6.7.2. Affected is the function regmap_raw_read of the component sc16is7xx. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-52488. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.12.6 and classified as critical. This issue affects some unknown processing of the component RDMA. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2021-47076. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.31/6.8.10/6.9.1 and classified as critical. This issue affects the function l2cap_le_flowctl_init of the component Bluetooth. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-36968. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in File up to 5.42. Affected is the function file_copystr of the file funcs.c. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2022-48554. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in wolfSSL up to 5.6.4. This affects an unknown part of the component Elliptic Curve Handler. The manipulation leads to information exposure through discrepancy.
This vulnerability is uniquely identified as CVE-2024-1544. Local access is required to approach this attack. There is no exploit available.